Bug #22243 | Unicode SQL Injection Exploit | ||
---|---|---|---|
Submitted: | 11 Sep 2006 18:44 | Modified: | 7 Jul 2009 17:05 |
Reporter: | Bryan Livingston | Email Updates: | |
Status: | Duplicate | Impact on me: | |
Category: | Connector / NET | Severity: | S2 (Serious) |
Version: | 1.0.2445.20017 | OS: | Windows (Windows XP) |
Assigned to: | CPU Architecture: | Any | |
Tags: | Exploit, Injection, Unicode |
[11 Sep 2006 18:44]
Bryan Livingston
[11 Sep 2006 19:03]
Bryan Livingston
A better encoder is probably. This is very simmilar but may have better support for the euro sign or may perform better. private static Encoding encoder = Encoding.Default; // default windows code page (1252) And from the disassemble code of the Encoding.Default, it use the following code logic: =========== private static Encoding CreateDefaultEncoding() { int num1 = Win32Native.GetACP(); if (num1 == 0x4e4) { return new SBCSCodePageEncoding(num1); } return Encoding.GetEncoding(num1); } ===========
[18 Sep 2006 7:46]
Tonci Grgin
Hi Bryan, can you please recheck answers posted by Reggie in BUG#10870 and get back with results?
[18 Oct 2006 23:00]
Bugs System
No feedback was provided for this bug for over a month, so it is being suspended automatically. If you are able to provide the information that was originally requested, please do so and change the status of the bug back to "Open".
[7 Jul 2009 17:05]
Reggie Burnett
this is the same bug as bug #45941 which is getting fixed in 5.1.8+, 5.2.7+, and 6.0.5+